Results 1 to 10 of about 47,392 (384)

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2018
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu   +4 more
doaj   +4 more sources

CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganography [PDF]

open access: yesarXiv, 2023
Current image steganography techniques are mainly focused on cover-based methods, which commonly have the risk of leaking secret images and poor robustness against degraded container images. Inspired by recent developments in diffusion models, we discovered that two properties of diffusion models, the ability to achieve translation between two images ...
Jiwen Yu   +3 more
arxiv   +3 more sources

Steganography Security: Principle and Practice [PDF]

open access: yesIEEE Access, 2018
This paper focuses on several theoretical issues and principles in steganography security, and defines four security levels by analyzing the corresponding algorithm instances.
Yan Ke   +4 more
doaj   +2 more sources

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats [PDF]

open access: yesISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference, N. Pohlmann, H. Reimer, W. Schneider (Editors), pp. 1-11, 2014
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography. Similarly, other malicious activities can profit from network steganography, such as data leakage or the exchange of pedophile data.
Caviglione, Luca   +3 more
arxiv   +3 more sources

Image vaccine against steganography in encrypted domain [PDF]

open access: yesScientific Reports
This paper investigates on the defense against steganography, and the overall purpose of the study is to design a satisfactory defense scheme in encrypted domain.
Xinran Li, Zichi Wang
doaj   +2 more sources

Survey of the Use of Steganography over the Internet [PDF]

open access: yesInformatică economică, 2011
This paper addressesthe use of Steganography over the Internet by terrorists. There were ru-mors in the newspapers that Steganography is being used to covert communication between terrorists, without presenting any scientific proof.
Lavinia Mihaela DINCA
doaj   +2 more sources

Enhanced payload volume in the least significant bits image steganography using hash function [PDF]

open access: yesPeerJ Computer Science, 2023
The art of message masking is called steganography. Steganography keeps communication from being seen by any other person. In the domain of information concealment within images, numerous steganographic techniques exist. Digital photos stand out as prime
Yazeed Yasin Ghadi   +5 more
doaj   +3 more sources

Steganographically Encoded Data [PDF]

open access: yesInformatică economică, 2007
Steganography is the art of hiding information in ways that prevent its detection. Though steganography is an ancient craft, the onset of computer technology has given it new life.
Adrian VASILESCU
doaj   +2 more sources

A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network

open access: yesIEEE Access, 2020
Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the ...
Xintao Duan   +5 more
doaj   +3 more sources

RoSteALS: Robust Steganography using Autoencoder Latent Space [PDF]

open access: yes2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2023
Data hiding such as steganography and invisible watermarking has important applications in copyright protection, privacy-preserved communication and content provenance.
Tu Bui   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy